Full Transcript

MoEE - Exit Exam Software Engineering Model Exam Brought to u by t.me/dagmawi_abate 1. A process scheduling approach on which decision as to which available process will be executed by the Processor refers to: a. Long-term scheduling b. I/O schedulin...

MoEE - Exit Exam Software Engineering Model Exam Brought to u by t.me/dagmawi_abate 1. A process scheduling approach on which decision as to which available process will be executed by the Processor refers to: a. Long-term scheduling b. I/O scheduling c. Short-term scheduling d. Medium-term scheduling 2. Which of the following analysis mechanism defines the input for which the algorithm takes the least time (fastest time to complete)? a. Best case b. Average case c. Standard Case d. Worst case 3. Which of the following UML diagram is not used to represent dynamic behavior of an object during analysis? a. Instance diagram b. Sequence diagram. c. Collaboration diagram d. Activity diagram MoEE - Exit Exam Software Engineering Model Exam 4. Assume there is Class A which is extended by Class B and Class C Class A is declared as abstract, and also contains an abstract method called welcome; this method takes no parameters, and returns a String. Which of the following definitions of Class B will NOT cause a compiler error based on the above scenario? a. public class Class B extends Class A { public String whatObjectAmI() { return "I am a class B object"; } } b. public class Class B extends Class A { public void welcome(String str) { } } c. public class Class B extends Class A { public String whatObjectAmI() { return "I am a class 8 object"; } } d. public class Class B extends Class A { public void welcome(String str) { } } MoEE - Exit Exam Software Engineering Model Exam 5. Which of the following is not type of Ensemble learning? a. Lasso b. Boosting c. Bagging d. Random forest 6. A technique for generating plans with conditionals and loops are almost identical to those for generating programs from logical specifications is called___. a. Automatic programming b. Automatic learning c. Automatic monitoring d. Automatic recursive 7. The CSS property used to specify the transparency of an element is? a. Transparency b. Opacity c. Background d. Alpha 8. Which of the following describes the functionalities of application layer? a. It deals encapsulation of frames b. It deals encapsulation of packets c. It deals mechanical, electrical and physical connectivity d. It is process to process interaction 9. Which function is used to serialize an object into a JSON string in Javascript? a. parseJson() b. toJson() c. stringify0 d. parse() 10. A TCP/IP port number used by SSH is? a. 20 MoEE - Exit Exam Software Engineering Model Exam b. 22 c. 23 d. 21 11. Given the following fragment of code, how many tests are required for 100% decision coverage? if width > length. then biggest_dimension = width if height > width then biggest_dimension = height end_if else biggest_dimension = length if height > length then biggest_dimension = height end_if end_if a. 2 b. 6 c. 4 d. 3 12. Which of the following is true regarding the referential triggered action ON UPDATE CASCADE a. sets the referencing primary key to NULL b. change the value of the referencing foreign key attribute to the updated primary key value for all the referencing tuples c. sets the referencing primary key of the base table to default value d. deletes all tuples of the referencing table 13. Which file system can be used to change certain kernel parameters at runtime using sysctl command? a. Ext4 b. Sysfs c. Procfs MoEE - Exit Exam Software Engineering Model Exam d. Ext3 14. A software tool, such as a design editor or a program debugger, that developers and other software stakeholders use to support an activity in the software development process is a. CASE tools b. CMMI c. CMM d. BPMN 15. Which of the following statements designates part of the process of how a switch resolves to forward a frame destined for a recognized unicast MAC address? a. It matches the unicast destination address to the bridging, or MAC address, table. b. It matches the unicast source address to the bridging, or or MAC address, table. c. It matches the frame's incoming interface to the source MAC entry in the MAC address table. d. It matches the destination IP address to the destination MAC address. 16. Which of the following is a unique IPV4 address? a. 172.17.17.17/26 b. 172.16.30.0/16 c. 172.16.25.250/16 d. 172.43.17.1/16 17. Which one of the following is not correct? a. HTML form element can be of different types b. HTML form elements are used for taking user input c. HTML form elements are used for displaying outputs d. HTML form elements are defined inside tag 18. One of the following statements addresses the characteristics of functional organization structure? a. Low to moderate project manager authority, low to moderate resource availability, and a full-time project manager's role b. Little or no project manager authority, little or no resource availability, and the functional manager control the project budget c. High to almost total project manager authority, high to almost total resource availability, and full-time project management administrative staff MoEE - Exit Exam Software Engineering Model Exam d. Limited project manager authority, limited resource availability, and a part-time project manager's role 19. What will be the output of the following program class increment { public static void main(String args[]) { int a=4; System.out.print(++a * 5); } } a. 5 b. 20 c. 24 d. 25 20. In a quad-tree each non-leaf node has exactly ____ children. a. 2 b. 1 c. 4 d. 3 21. Which of the following mostly used by software project quality evaluators to using the approach of plan, check and act? a. IEEE b. Capability maturity model c. Six sigma d. ISO model 22. The result of the following program after running will be: class PrintResult { MoEE - Exit Exam Software Engineering Model Exam public static void main(String args[]) int arr[] = {3, 4, 5, 6, 7}; for (int i = 0;i < arr.length - 2; ++i) System.out.println(arr[i] + " "); } } } a. 3 4 5 b. 3 4 5 6 c. 3 4 d. 3 4 5 6 7 23. An Artificial Intelligence system is composed of: a. Agent and Environment b. Data and Information c. Device and Network d. Technology and Evolution 24. Which of the following is true regarding integration testing? a. It uses test data that simulates ideal scenarios. b. It emphases on testing individual software components in isolation. c. It proves the functioning of different software components when integrated together. d. It is only performed after system testing is completed. 25. Which of the following describes the leading agile development method? a. Sprint b. Six sigma c. Extreme programming d. Scrum 26. Which access modifier is suitable if you want your instance variables to be accessible from both the methods of the class and the descendant classes? MoEE - Exit Exam Software Engineering Model Exam a. Private b. Inherited c. Public d. Protected 27. Which of the following is not a data link layer technology? a. OSPF b. VLAN c. PPP d. Frame-relay 28. The purpose of header file in c++ program is: a. Makes the code secure b. to make the code readable c. to provide input/output functionality d. to create file streams 29. What of the following describes informed search algorithms? a. They are optimal b. They are admissible c. They are consistent d. They are complete 30. Which one is not an architectural style? a. MVC b. Client server c. UML d. OSI layer 31. As a software tester, which testing principle can save time and cost of testing? a. Exhaustive testing is not possible b. Testing early development process saves time and cost c. Prioritize testing based on risk and criticality MoEE - Exit Exam Software Engineering Model Exam d. Testing the entire development process affect time and cost 32. Which of the following specifies divergence between Dijkstra's Algorithm (DA) and Uniform Cost Search (UCS) algorithms? a. DA is optimal, but not UCS b. UCS finds the optimal solution while DA c. DA first collects them into a Queue but UCS discover them as they come d. DA discovers nodes as they come while UCS first collects them in a Queue 33. In software testing, a term which relates the genuine imperfect segments to the absolute number of segments anticipated as faulty known as: a. F-measure b. Recall c. Accuracy d. Precision 34. Which of the following is not true about binary tree? a. Empty tree is also a valid binary tree b. We can visualize a binary tree as consisting of a root and two disjoint binary trees c. A tree is called binary tree if each node has zero child, one child or two children d. A tree is called binary tree if and only if each node has zero child 35. What will happen if there is no break statement next to case labels in switch statement? a. All non-matching case labels will be executed b. The program generates exception c. The default block will be executed d. The program will halt 36. Security estimation is an essential component of ______ process. a. Software design b. Software development c. SRS design d. Risk management 37. Which of the following is one of the indirect applications of queues? MoEE - Exit Exam Software Engineering Model Exam a. Multiprogramming b. Operating systems schedule jobs (with equal priority) in the order of arrival (e.g., a print queue). c. Auxiliary data structure for algorithms d. Simulation of real-world queues such as lines at a ticket counter or any other first-come first-served scenario requires a queue. 38. Which development model helps to cope up with software requirement change to reduce the cost of rework? a. staged delivery b. prototyping c. Spiral model d. Software Version control 39. A temporary endeavor undertaken to create a unique product, service, or result is known as: a. Program b. Portfolio c. Project d. Process 40. Select the one different from others a. System design b. Requirement validation c. Requirement elicitation d. Requirement analysis 41. One of the following is model optimization technique: a. Gradient descent b. Bagging c. Lasso d. Gradient boosting 42. The keyword used in the SELECT clause to eliminate duplicate tuples from the result of an SOL query is a. UNIQUE MoEE - Exit Exam Software Engineering Model Exam b. DISTINCT c. Group By d. PRIMARY 43. The ultimate purpose of inheritance in OOP is: a. Data protection b. Code reusability c. Resources saving d. Providing multiple forms for methods 44. The base class from which all classes in Java are inherited? a. java.lang.class b. java.class.inherited c. java.lang.Object d. java.class.object 45. Which one is not among the layouts available in android? a. Card Layout b. Linear Layout c. Relative Layout d. Frame Layout 46. Which CSS element is used to make rounded borders around elements? a. border-circle b. border-rounded c. border-radius d. border-corner 47. A technique that allows large numbers of ideas to be classified into groups for review and analysis a. Affinity Diagrams b. Activity-on-Node c. Activity List d. Adaptive Life Cycle MoEE - Exit Exam Software Engineering Model Exam 48. Which of the following refers to unauthorized disclosure of information? a. Integrity b. Confidentiality c. Authentication d. Authorization 49. Which of the following is not the contribution of the big data analysis a. To introduce new culture of data usage b. To gain competitive advantage c. To cope up with volatile market d. To satisfy customer need 50. The correct structure of the for loop statement is: a. for(initialization, condition, increment/decrement b. for(initialization; condition) c. for(increment/decrement; initialization; condition) d. for(initialization; condition; increment/decrement) 51. Introducing new requirement at the later phase of the project is not recommended due to? a. Cost of change b. coding complexity c. analysis complexity d. requirement complexity 52. Being a software tester you want to verify the integration of the message between different processes communication using ______. a. Network authorization b. Decryption algorithm c. Message Digest d. Digital Signature 53. Fundamental program structure consists of the following core components except a. back end component MoEE - Exit Exam Software Engineering Model Exam b. Variable definition c. main0 method d. Input/output features 54. Assume you have the following hash table, implemented using linear probing. The hash function you are using is the identity function, f(x) = x. In which order could the elements have been added to the hash table? There are several correct answers, and you should give all of them. Assume that the hash table has never been resized, and no elements have been deleted yet. a. 12, 14, 3, 9, 4, 18, 21 b. 9, 14, 4, 18, 12, 3, 21 c. 12, 9, 18, 3, 14, 21, 4 d. 12, 3, 14, 18, 4, 9, 21 55. If your software system can continue in spite of unexpected problems from internal and external environment, we say your system has good: a. Integrity b. Robustness c. Maintainability d. Reliability 56. What does velocity in big data refer to? a. Speed of storage consumption b. Speed of data ingestion c. Speed of input data generation d. Speed of data processing and storing 57. Which of the following android component displays the part of an activity on screen? a. Manifest b. Intent c. View d. Fragment 58. Assume that you are assigned to design a dormitory management database. A dormitory is located on some building and has attributes specified as DORM (DormID, floornumber) and DormID is a MoEE - Exit Exam Software Engineering Model Exam primary key. Based on university's rule, six students can be assigned to one dorm. Students can be tracked with attributes STUDENT (IdNo, Name, Department) and IdNo is primary key. Referring to this scenario, if there is a rule that says every DORM must have at least one student, which of the following is true? a. STUDENT has a total participation b. STUDENT has existence dependency c. DORM has partial participation d. DORM has existence dependency 59. A program that initializes all aspects of the system, from CPU registers to device controllers and the contents of main memory, and then starts the operating system known as: a. Bootstrap b. Cache memory c. Bootloader d. BIOS 60. Method overriding is a characteristic of which OOP principle? a. Abstraction b. Inheritance c. Encapsulation d. Polymorphism 61. A tool that is used to check the quality of software to ensure that it meets some minimum coding standards. a. Code Auditor b. Documenters c. Test Data Generator d. Interactive Debuggers 62. A system software that resides in main memory is a. Compiler b. Loader c. Executor d. Linker MoEE - Exit Exam Software Engineering Model Exam 63. Which object-oriented principle allows the creation of several methods with the same name that differ from each other by the type of input and output? a. Overriding b. Inheritance c. Encapsulation d. Polymorphism 64. Which one is not the criteria for selecting best programming language for your problem: a. Modularity b. Platform dependency c. Portability d. Code efficiency 65. Which of the following virtual machines is used by the Android operating system? a. CLR b. Docker c. Dalvik virtual machine d. JVM 66. Which of the following is the first callback method that is invoked by the system during an activity life-cycle? a. onRestart0 method b. onCreate0 method c. onClick0 method d. onStartO method 67. APK stands for: a. Android Phone Kit b. Android Package Kit c. Android Page Kit d. Android Platform Kit 68. Which principle states that 80% of the problems can be fixed with 20% of the entire effort? a. Pairwise principle MoEE - Exit Exam Software Engineering Model Exam b. Partition principle c. Pareto principle d. Parametric principle 69. Select the one that is not correct related to generalization in system modeling. a. In generalization, the attributes and operations associated with higher-level classes are also associated with the lower-level classes b. The higher-level classes are more specific than the lower-level classes by adding specific attributes and operations c. facilitate easy modification of data d. common information will be maintained in one place 70. Action attribute in HTML forms specifies a. The auto completion of form b. Which HTTP method is used c. Which action is going on d. Where to submit form 71. Which of the following indicates the assurance that a product, service, or result meets the needs of the customer and other identified stakeholders? a. Variance b. SWOT Analysis c. Validation d. Verification 72. In a relation design, primary key is a critical constraint that should be considered. It should be defined: a. Non editable b. NOT NULL c. Within limited value d. NULL 73. Adding additional header information as data moved from the application layer to down refers to: a. De-capsulation b. Routing MoEE - Exit Exam Software Engineering Model Exam c. Switching d. Encapsulation 74. The incredible change in business and society as emerging economies develop and new technologies become available mainly: a. Makes obsolete the already existing software systems b. Leads to demand for new software architecture c. Requires new testing on the existing software systems d. Leads to Privacy and security breaches 75. A software work product which is associated with the test execution process group is known as: a. Test Reports b. Requirements c. Test Cases d. Code 76. One of the following statements is inappropriate about Artificial Intelligence? a. An agent perceives its environment through effectors. b. It is a preprogrammed system, c. AI is a multidisciplinary field of study. d. Ability to learn from the environment 77. Which of the following concept describes bootstrapping? a. A language interpret other language program b. A language compile itself c. A language compiling other language program d. All of the above 78. Identify the one that does not affect architectural decision a. Architectural style to be used b. Type of the application to be developed c. The way the data is stored d. Expected performance of the system MoEE - Exit Exam Software Engineering Model Exam 79. You fit a model too closely to the particularities of the training set and obtain a model that works well on the training set but works poorly on a new data. This scenario is known as: a. over fitting b. sweet spot c. under performing d. under fitting 80. For the software architecture to be easily understood by other design experts for later maintenance and scalability, there should be a. Architectural optimization techniques b. Architectural notation and semantic description c. Architectural refactoring d. Architectural reverse engineering 81. A modification of the free-list approach is to store the addresses of n free blocks in the first free block. a. Grouping b. Counting c. Linked-list d. Deadlock 82. If performance is the critical requirement of your architecture, which architectural approach you apply while architecting your system? a. Increase number of component communication b. Increase number of components c. Localize critical operations d. Distribute operations across network 83. What is the time complexity of below function? Public void function (int n) { for (int i = 0; i

Use Quizgecko on...
Browser
Browser